Plaintext

Results: 367



#Item
121Ciphertext / Known-plaintext attack / Cryptographic protocols / RSA / Weak key / Kerberos / Initialization vector / Challenge-response authentication / Cryptography / Public-key cryptography / Password

© ACM, 1989. This is the authorsʼ version of the work, posted by permission of ACM. http://doi.acm.org[removed]74853 Reducing Risks from Poorly Chosen Keys T. Mark A. Lomas, Li Gong, Jerome H. Saltzery, Roger M.

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:06:38
122Ciphertext / Cramer–Shoup cryptosystem / Chosen-plaintext attack / Semantic security / Cipher / Chosen-ciphertext attack / RSA / ElGamal encryption / Email encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth1 , Dan Boneh?1 , and Brent Waters2 1 2

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2007-04-29 16:34:52
123Bletchley Park / Milton Keynes / Biuro Szyfrów / Enigma machine / Marian Rejewski / Bombe / Known-plaintext attack / Alan Turing / Government Communications Headquarters / Cryptography / Espionage / Buckinghamshire

Central Bureau Intelligence Corps - Association Newsletter June 2010 CENTRAL BUREAU INTELLIGENCE CORPS ASSOCIATION

Add to Reading List

Source URL: www.ozatwar.com

Language: English - Date: 2014-03-30 07:09:20
124Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
125Buckinghamshire / Enigma machine / Ultra / Bombe / Magic / Anzac Day / Harry Hinsley / Known-plaintext attack / Enigma / Cryptography / Espionage / Bletchley Park

Central Bureau Intelligence Corps Association June 1994 Number 2, 1994

Add to Reading List

Source URL: www.ozatwar.com

Language: English - Date: 2014-11-19 21:52:01
126Computer security / Crypt / Passphrase / Block cipher / Known-plaintext attack / Stream cipher / Password / Cyberwarfare / Encrypting File System / Cryptography / Cryptographic software / Cipher

Contents I Table of Contents Foreword

Add to Reading List

Source URL: www.bytefusion.com

Language: English - Date: 2007-05-31 21:17:29
127Subtitle / Known-plaintext attack / Technology / Media technology / Visual arts / Digital media / Subtitling / Digital cinema

Microsoft Word - CTP Revision[removed]Subtitle Tests-new sections to be inserted at end.doc

Add to Reading List

Source URL: www.dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
128Group theory / Julius Caesar / Cipher / Symmetric-key algorithm / Key size / Key / Data Encryption Standard / Blowfish / Known-plaintext attack / Cryptography / Key management / Caesar cipher

Explaining Encryption Introduction Make any enquiry about computer security, and you will almost immediately fall over the terms cryptography and encryption (and also decryption), but what exactly is meant by this? The d

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:09
129Science / Statistics / Computational linguistics / Automatic summarization / Data mining / Beer rating / Sentiment analysis / Semi-supervised learning / Grammatical aspect / Machine learning / Artificial intelligence / Natural language processing

Learning Attitudes and Attributes from Multi-Aspect Reviews Julian McAuley, Jure Leskovec, Dan Jurafsky Stanford Abstract—The majority of online reviews consist of plaintext feedback together with a single numeric scor

Add to Reading List

Source URL: i.stanford.edu

Language: English - Date: 2013-04-23 21:45:38
130Password / Ciphertext indistinguishability / Dropbox / Comodo Group / Unified Extensible Firmware Interface / Crypt / Chosen-plaintext attack / Man-in-the-middle attack / Plaintext / Software / Computing / Cryptography

Security Now! #Q&A #208  This week on Security Now! ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-03-17 16:05:33
UPDATE